Hacking Marketplace Nulled.IO Hacked

Here is the weekly roundup :

Hacking Marketplace Nulled.IO Hacked
The email addresses, private messages, IPs and password data of some 500,000 members of a hacker forum that essentially served as a marketplace of compromised passwords, stolen bitcoins, and other data has been leaked.

Sony Breach from 2014 Linked to Bangladesh Bank Cyber Heist
Investigators looking into the Bangladesh bank cyber heist have revealed that the evidence of a specific malware discovered in the attack has the “same unique characteristics” as malware found in the infamous Sony studios breach from 2014.

Lucrative Business: Hacking the Stock Market
A 28 year old hacker from Ukraine pleaded guilty to a $30 mil. scheme involving hacking & stealing unreleased press releases, and using the obtained information to make illegal trades. Over 30 others were involved in the scheme and are now facing criminal charges.

Is Mobile Security on Your Radar?
As the entire world moves towards mobile and the Internet of Things (IoT) surges the enterprise, mobile application security has become crucial for businesses of all sizes across the industry. After all, these devices are the gateway not just to our personal lives, but to our corporate brand integrity as well; and compromised security could spell a major disaster.

Interesting Reading From Around the Web

LinkedIn Resets Passwords As 117M Logins For Sale On Dark Web
LinkedIn has confirmed a significant breach from 2012 was worse than first thought, with the number of leaked usernames and passwords rising from 6.5 million to a purported 117 million.

Carding Sites Turn to the ‘Dark Cloud’
Crooks who peddle stolen credit cards on the Internet face a constant challenge: Keeping their shops online and reachable in the face of meddling from law enforcement officials, security firms, researchers and vigilantes. In this post, we’ll examine a large collection of hacked computers around the world that currently serves as a criminal cloud hosting environment for a variety of cybercrime operations, from sending spam to hosting malicious software and stolen credit card shops.

FDIC, Wendy's Delay Breach Notifications
Recent disclosures by the FDIC and Wendy’s following breach incidents underscore the protracted nature of detection and post-breach notifications. States in the U.S. and the European Union hope to shorten that timeline.

Upcomming Events

Enfuse 2016
Las Vegas, NV, May 24-26
More information

AlienSpy RAT Webinar w/ Cyphort
Online, May 25
More information

Net Diligence Cyber Forum
Philadelphia, PA, June 7-8
More information

ICT 2016
Bratislava, SK, June 7-8
More information

Featured Articles

Hackers Snatching Executive Emails, Costing Companies Billions

It goes like this. It’s a regular Tuesday. Things are humming along just fine. Someone you know from your HR department sends an email asking you to look over an attached spreadsheet. Or your supervisor emails you to review an attached Microsoft Word document. Nothing raises a red flag. So, you do as instructed. But the emails are fakes. The attachments and hyperlinks just opened up your system to fraud.

Read Article

Expert Panel: The Top Considerations for Comparing Data Classification Tools

Data classification tools play an important role in enterprise data protection, tagging sensitive data in various formats to enable protective policies to be applied to different data types. As such, it's important that enterprises evaluate data classification options carefully and identify the best classification tools for their specific data protection needs.

Read Article

Connect with us

LinkedIn Twitter Facebook Google Website YouTube

LIFARS LLC, 244 Fifth Avenue, Suite 2035, New York, NY 10001 Copyright © 2016 LIFARS, LLC, All rights reserved.